Articles with "eavesdropping jamming" as a keyword



Photo by acfb5071 from unsplash

Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3150244

Abstract: This letter studies proactive eavesdropping with one legitimate monitor (E) in the classical single-hop suspicious communication. Specifically, unlike all previous works that ignored the suspicious channel training phase and just considered the jamming power optimization… read more here.

Keywords: power allocation; proactive eavesdropping; eavesdropping jamming; power ... See more keywords